Browsing the "iphone" Tag

iPhone Forensics – HowTo

January 7th, 2012 | ๐Ÿ•’

iSpeech.org iPhone forensics can be performed on the backups made by iTunes (escrow key attack) or directly on the live


Top 10 iPhone Security Tips

November 23rd, 2011 | ๐Ÿ•’

iSpeechThis paper offers guidelines on securing your iPhone using features provided by iOS and by following other security best practices.It


Top 10 iPhone Security Tips

November 23rd, 2011 | ๐Ÿ•’

https://www.ispeech.org/text.to.speechThis paper offers guidelines on securing your iPhone using features provided by iOS and by following other security best practices.It


Pentesting iPhone Applications

November 1st, 2011 | ๐Ÿ•’

Text to Speech Demo This presentation mainly focuses on methodology, techniques and the tools that will help security testers while


Pentesting iPhone Applications

October 17th, 2011 | ๐Ÿ•’

iSpeech.org This presentation mainly focuses on the techniques and the tools that will help security testers while assessing the security